Some checks failed
Integration Tests / test-service-integration (push) Successful in 2m16s
Package Tests / Python package - aitbc-agent-sdk (push) Successful in 25s
Package Tests / Python package - aitbc-core (push) Successful in 22s
Package Tests / Python package - aitbc-crypto (push) Successful in 14s
Package Tests / Python package - aitbc-sdk (push) Successful in 18s
Package Tests / JavaScript package - aitbc-sdk-js (push) Successful in 6s
Package Tests / JavaScript package - aitbc-token (push) Successful in 21s
Production Tests / Production Integration Tests (push) Failing after 10s
Python Tests / test-python (push) Failing after 2m41s
Security Scanning / security-scan (push) Failing after 46s
Smart Contract Tests / test-solidity (map[name:aitbc-token path:packages/solidity/aitbc-token]) (push) Successful in 16s
Smart Contract Tests / lint-solidity (push) Successful in 12s
- Simplified npm install commands in CI workflows by removing fallback logic - Added aitbc-crypto local dependency installation for aitbc-sdk in package-tests.yml - Removed aitbc-token specific Hardhat dependency workarounds from package-tests.yml - Fixed bare except clause in agent_daemon.py to catch specific json.JSONDecodeError - Moved aitbc-crypto from poetry.dependencies to standard dependencies in aitbc-sdk - Fixed MyPy type errors in receip
62 lines
1.7 KiB
Solidity
62 lines
1.7 KiB
Solidity
// SPDX-License-Identifier: MIT
|
|
pragma solidity ^0.8.24;
|
|
|
|
import { AccessControl } from "@openzeppelin/contracts/access/AccessControl.sol";
|
|
|
|
/// @title AITokenRegistry
|
|
/// @notice Tracks permitted providers and staking requirements for AIToken minting
|
|
contract AITokenRegistry is AccessControl {
|
|
bytes32 public constant COORDINATOR_ROLE = keccak256("COORDINATOR_ROLE");
|
|
|
|
struct ProviderInfo {
|
|
bool active;
|
|
uint256 collateral;
|
|
}
|
|
|
|
mapping(address => ProviderInfo) public providers;
|
|
|
|
event ProviderRegistered(address indexed provider, uint256 collateral);
|
|
event ProviderUpdated(
|
|
address indexed provider,
|
|
bool active,
|
|
uint256 collateral
|
|
);
|
|
|
|
constructor(address admin) {
|
|
_grantRole(DEFAULT_ADMIN_ROLE, admin);
|
|
}
|
|
|
|
function registerProvider(
|
|
address provider,
|
|
uint256 collateral
|
|
) external onlyRole(COORDINATOR_ROLE) {
|
|
require(provider != address(0), "invalid provider");
|
|
require(!providers[provider].active, "already registered");
|
|
providers[provider] = ProviderInfo({
|
|
active: true,
|
|
collateral: collateral
|
|
});
|
|
emit ProviderRegistered(provider, collateral);
|
|
}
|
|
|
|
function updateProvider(
|
|
address provider,
|
|
bool active,
|
|
uint256 collateral
|
|
) external onlyRole(COORDINATOR_ROLE) {
|
|
require(provider != address(0), "invalid provider");
|
|
require(providers[provider].active || active, "provider not registered");
|
|
providers[provider] = ProviderInfo({
|
|
active: active,
|
|
collateral: collateral
|
|
});
|
|
emit ProviderUpdated(provider, active, collateral);
|
|
}
|
|
|
|
function providerInfo(
|
|
address provider
|
|
) external view returns (ProviderInfo memory) {
|
|
return providers[provider];
|
|
}
|
|
}
|